|Related Tags: databases etl cloudconnect|
In CloudConnect Designer, a common use case involves extracting data from a local database and uploading it to your GoodData project. This development process can be impacted by any firewalls in place to protect your internal database.
To facilitate connectivity to resources behind enterprise firewall systems, CloudConnect Designer includes a secured proxy so that all external traffic is passed through a single address. Since CloudConnect Designer is consistently reaching out to your local database from a consistent address, you can easily implement a CloudConnect reference in the whitelists of your local systems.
Whitelisted IP addresses
To enable CloudConnect whitelisting, please add the following IP addresses to your firewall:
The IP address
22.214.171.124 is no longer valid as of March 15, 2014. Add
126.96.36.199 to your firewall settings immediately to prevent service interruption.
Common Database Ports
Below, you can see the specific ports used by common database engines. Depending on the installed database, these ports need to be enabled for communication between CloudConnect Designer and the database:
|Microsoft SQL Server|
|Amazon Redshift JDBC driver|
- For more information on supported integrations, see GoodData Data Sources (PDF).
- For more information, please contact GoodData Customer Support.
GoodData Connection Ports
For more information on GoodData ports see Ports Used to Connect to GoodData.